Cherreads

Chapter 23 - Chapter 23 New Identity

After stretching his fingers, he started coding; line by line, codes appeared on the screen. At the same time, afterimages flashed above the keyboard.

Neil then stopped and adjusted the key press frequency duration to the lowest and started typing the codes again; the code writing speed increased by a few percent.

After a few hours,

Looking at a program running on his laptop screen, looking at a simple blank screen-like command prompt, the main OS completely stopped working; now the laptop is running a single coding program with all its calculations.

"Next I have to spread the malware through the internet toward those idle computers and servers belonging to some offices and malls and add a pre-time algorithm malware,"

Neil muttered thoughtfully, thinking of the plan he is going to use in order to invade the national database server.

He is planning to scatter the parts of hacking algorithms and codes and store them into those idle computers and servers in the whole state and create a web, while he will control that web with a single thread, which is his laptop, like that entire web of calculations, which will be at his disposal; even if the network is slow in some points of the web, other points will make up for it.

After looking at the ready prototype of the web in front of him,

Neil added a code and entered; instantly, the packet containing the code and algorithm spread through the wifi network and was stored inside the computers of the household, which is also connected to that wifi; then it spread toward other networks through the main line.

Soon the packets multiplied and reached other networks; in just a few minutes, they reached the PCs in the whole city. Slowly, the prototype of the web was created.

A smile appeared on Neil's face, and then he realized something and muttered,

"I remember there is a peer-to-peer technology in this world, although there is no cryptocurrency in this world, but the original currency is based on this technology known as TR technology, which is based on physical silver and gold in the world; if the real gold and silver coin supply increases, then the digital gold and silver circulation supply will also increase accordingly; also, each real and digital coin is traceable to the core through peer-to-peer technology; that's why such a system can't be hacked by conventional means."

After a while,

Neil glanced at the twenty-five percent progress written on the blank screen in front of him. "It will take a while; before that I should arrange my background."

He muttered, opened a program, took a selfie of himself with brown pupils, and tweaked his appearance and hairstyle a little, making himself look different from before, and then he added other information in the form.

Fake name, fake address. After creating a fake persona, he then started hacking into the databases of hospitals and schools, creating fake birth certificates and education certificates.

Although he is sixteen years old, he increased his age to eighteen years old in his birth certificate and all middle school and high school certificates.

After seeing the progress of his spreading algorithm reach fifty percent, he set a limit of one hundred percent according to the calculation required; when it passes one hundred percent, he will have enough calculation to hack the main database of the state.

"Initiate the parallel simulation, hack the database, and create a perfect new identity for me and add a flawless background in order to back up my identity,"

Neil then issued the command activating his unlimited simulation in order to prevent any problems during the hacking process.

[Complex command detected]

[Unlimited parallel simulation initiated]

[After seeing the progress of your web reach at one hundred percent, you initiated the invasion in the state database.]

[You were surprised to find that it was easier to hack the database than you thought.]

[You also realized that the data encryption technology of this world online technology is at least five to ten years behind Earth.]

[After confirming the current world network and encryption technology, you sighed in relief and then started adding new identity information, including the name, address, and education details.]

[After completing the process, you thought of your real identity, and you decided to search the family name in the database.]

[After searching the Zoltan surname, more than a thousand results appeared in front of you.]

[You were disappointed and decided to find your real identity and the culprit behind your assassination using other ways.]

[After completing the search, you retreated from the database after confirming that you had added a new identity tracelessly.]

[Simulation Archived Successfully]

"Well, my calculations and guesses about protection and privacy technology were based on previous earth technology; that's why I overdid it in this civilization,"

Neil muttered thoughtfully, looking at the simulation results, then he glanced at the progress of web spreading, which reached one hundred percent.

He stretched his fingers and started inputting the commands toward the web; instantly, the database firewalls were attacked from all directions, and one of the web points successfully breached the database.

Neil followed that point, and a web interface appeared on the screen in front of him.

He hurriedly opened the identity forms with official stamps and signatures, then he copied a form and started editing it, first adding his profile picture and then adding his name and address, also education details.

After completing the detailed edition and uploading it in the database in a unique sequence, a new identity number appeared on his form, which means the database has recognized his identity and assigned him a unique citizen number.

Neil nodded calmly, seeing the identity creation is completed without any issue.

He retreated from the database, then he closed the web by shutting down all the nodes in it, and then he changed the wifi network to another one, forgetting and blocking the previous two WiFi's used by him.

...

More Chapters